Alert button
Picture for Michail Maniatakos

Michail Maniatakos

Alert button

New York University Abu Dhabi

HowkGPT: Investigating the Detection of ChatGPT-generated University Student Homework through Context-Aware Perplexity Analysis

Add code
Bookmark button
Alert button
Jun 07, 2023
Christoforos Vasilatos, Manaar Alam, Talal Rahwan, Yasir Zaki, Michail Maniatakos

Figure 1 for HowkGPT: Investigating the Detection of ChatGPT-generated University Student Homework through Context-Aware Perplexity Analysis
Figure 2 for HowkGPT: Investigating the Detection of ChatGPT-generated University Student Homework through Context-Aware Perplexity Analysis
Figure 3 for HowkGPT: Investigating the Detection of ChatGPT-generated University Student Homework through Context-Aware Perplexity Analysis
Figure 4 for HowkGPT: Investigating the Detection of ChatGPT-generated University Student Homework through Context-Aware Perplexity Analysis
Viaarxiv icon

Get Rid Of Your Trail: Remotely Erasing Backdoors in Federated Learning

Add code
Bookmark button
Alert button
Apr 20, 2023
Manaar Alam, Hithem Lamri, Michail Maniatakos

Figure 1 for Get Rid Of Your Trail: Remotely Erasing Backdoors in Federated Learning
Figure 2 for Get Rid Of Your Trail: Remotely Erasing Backdoors in Federated Learning
Figure 3 for Get Rid Of Your Trail: Remotely Erasing Backdoors in Federated Learning
Figure 4 for Get Rid Of Your Trail: Remotely Erasing Backdoors in Federated Learning
Viaarxiv icon

Privacy-preserving machine learning for healthcare: open challenges and future perspectives

Add code
Bookmark button
Alert button
Mar 27, 2023
Alejandro Guerra-Manzanares, L. Julian Lechuga Lopez, Michail Maniatakos, Farah E. Shamout

Figure 1 for Privacy-preserving machine learning for healthcare: open challenges and future perspectives
Figure 2 for Privacy-preserving machine learning for healthcare: open challenges and future perspectives
Viaarxiv icon

Optimal Smoothing Distribution Exploration for Backdoor Neutralization in Deep Learning-based Traffic Systems

Add code
Bookmark button
Alert button
Mar 24, 2023
Yue Wang, Wending Li, Michail Maniatakos, Saif Eddin Jabari

Figure 1 for Optimal Smoothing Distribution Exploration for Backdoor Neutralization in Deep Learning-based Traffic Systems
Figure 2 for Optimal Smoothing Distribution Exploration for Backdoor Neutralization in Deep Learning-based Traffic Systems
Figure 3 for Optimal Smoothing Distribution Exploration for Backdoor Neutralization in Deep Learning-based Traffic Systems
Figure 4 for Optimal Smoothing Distribution Exploration for Backdoor Neutralization in Deep Learning-based Traffic Systems
Viaarxiv icon

Scalable privacy-preserving cancer type prediction with homomorphic encryption

Add code
Bookmark button
Alert button
Apr 12, 2022
Esha Sarkar, Eduardo Chielle, Gamze Gursoy, Leo Chen, Mark Gerstein, Michail Maniatakos

Figure 1 for Scalable privacy-preserving cancer type prediction with homomorphic encryption
Figure 2 for Scalable privacy-preserving cancer type prediction with homomorphic encryption
Figure 3 for Scalable privacy-preserving cancer type prediction with homomorphic encryption
Figure 4 for Scalable privacy-preserving cancer type prediction with homomorphic encryption
Viaarxiv icon

PiDAn: A Coherence Optimization Approach for Backdoor Attack Detection and Mitigation in Deep Neural Networks

Add code
Bookmark button
Alert button
Mar 26, 2022
Yue Wang, Wenqing Li, Esha Sarkar, Muhammad Shafique, Michail Maniatakos, Saif Eddin Jabari

Figure 1 for PiDAn: A Coherence Optimization Approach for Backdoor Attack Detection and Mitigation in Deep Neural Networks
Figure 2 for PiDAn: A Coherence Optimization Approach for Backdoor Attack Detection and Mitigation in Deep Neural Networks
Figure 3 for PiDAn: A Coherence Optimization Approach for Backdoor Attack Detection and Mitigation in Deep Neural Networks
Figure 4 for PiDAn: A Coherence Optimization Approach for Backdoor Attack Detection and Mitigation in Deep Neural Networks
Viaarxiv icon

ICSML: Industrial Control Systems Machine Learning inference framework natively executing on IEC 61131-3 languages

Add code
Bookmark button
Alert button
Feb 21, 2022
Constantine Doumanidis, Prashant Hari Narayan Rajput, Michail Maniatakos

Figure 1 for ICSML: Industrial Control Systems Machine Learning inference framework natively executing on IEC 61131-3 languages
Figure 2 for ICSML: Industrial Control Systems Machine Learning inference framework natively executing on IEC 61131-3 languages
Figure 3 for ICSML: Industrial Control Systems Machine Learning inference framework natively executing on IEC 61131-3 languages
Figure 4 for ICSML: Industrial Control Systems Machine Learning inference framework natively executing on IEC 61131-3 languages
Viaarxiv icon

TRAPDOOR: Repurposing backdoors to detect dataset bias in machine learning-based genomic analysis

Add code
Bookmark button
Alert button
Aug 14, 2021
Esha Sarkar, Michail Maniatakos

Figure 1 for TRAPDOOR: Repurposing backdoors to detect dataset bias in machine learning-based genomic analysis
Figure 2 for TRAPDOOR: Repurposing backdoors to detect dataset bias in machine learning-based genomic analysis
Figure 3 for TRAPDOOR: Repurposing backdoors to detect dataset bias in machine learning-based genomic analysis
Figure 4 for TRAPDOOR: Repurposing backdoors to detect dataset bias in machine learning-based genomic analysis
Viaarxiv icon

Explainability Matters: Backdoor Attacks on Medical Imaging

Add code
Bookmark button
Alert button
Dec 30, 2020
Munachiso Nwadike, Takumi Miyawaki, Esha Sarkar, Michail Maniatakos, Farah Shamout

Figure 1 for Explainability Matters: Backdoor Attacks on Medical Imaging
Figure 2 for Explainability Matters: Backdoor Attacks on Medical Imaging
Figure 3 for Explainability Matters: Backdoor Attacks on Medical Imaging
Figure 4 for Explainability Matters: Backdoor Attacks on Medical Imaging
Viaarxiv icon

FaceHack: Triggering backdoored facial recognition systems using facial characteristics

Add code
Bookmark button
Alert button
Jun 20, 2020
Esha Sarkar, Hadjer Benkraouda, Michail Maniatakos

Figure 1 for FaceHack: Triggering backdoored facial recognition systems using facial characteristics
Figure 2 for FaceHack: Triggering backdoored facial recognition systems using facial characteristics
Figure 3 for FaceHack: Triggering backdoored facial recognition systems using facial characteristics
Figure 4 for FaceHack: Triggering backdoored facial recognition systems using facial characteristics
Viaarxiv icon